Google has introduced a new feature called Restore Credentials which saves your app login info and restores it seamlessly on new devices.

  • Varyk@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    13 days ago

    that sounds… vulnerable.

    is that why Apple devices perpetually get broken into and all the pictures/info shared?

    because their login information is held by a third party?

      • Varyk@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        13 days ago

        I feel like I read a new article with Apple IDs being leaked every year.

        looks like there there have been six major apple data leaks since the 2014 incident you’re talking about, so a major leak based on exploits every year and a half, and then there’s also all the individual articles that pop up with someone saying they received notification that they’re iCloud data or Apple ID was leaked, which I don’t know the frequency of but I see all the time.

        https://firewalltimes.com/apple-data-breach-timeline

        https://discussions.apple.com/thread/254140360?sortBy=rank

        seems to happen fairly often.

        • Deckname@discuss.tchncs.de
          link
          fedilink
          English
          arrow-up
          2
          ·
          5 days ago

          Thanks for the links! apparently apple seems to deal with breaches quite well, and at least in the firewall times article most of the Breaches were not on really caused by apple and they reacted anyways. Exceptions are the pegasus hack, but no software is secure, and the exploit got patched.

          • Varyk@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            4 days ago

            surr… that’s how breach timelines go in general, it’s a lot easier to “hack” lax security procedures directly or for third parties that Apple or Microsoft shares sensitive information with than it is to attack any database directly.

        • coherent_domain@infosec.pub
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          13 days ago

          I think these are different. They mostly find vulnerability in the iOS system as opposed to try to crack the backup system.

          I think iOS or Android backup system are rather secure compared to other components because of the following: hacker will also need to break into a cloud drive to retrieve them, which adds extra work; the backup is simple, just bunch of files and a password, apple/google can use standard well-tested encryption to encrypt them.

          However, guaranteeing there is no way to break into an operating system, especially with all the features that a modern system requires, is much harder.